8
8
• src
alt
• href
• rel
9. What is the primary purpose of a Github pull request (PR) in a collaborative development workflow?
• To propose and discuss changes before merging them into the main branch
11. Alice is a project manager overseeing a GitHub repository that contains sensitive customer data.
What advanced security measures and best practices should Alice implement to protect sensitive data
from security threats and breaches?
O Implement encryption for the entire repository and use Github's default access controls.
• Enforce branch protection rules, conduct regular security audits, and educate contributors on secure
coding practices.
Share sensitive data openly with contributors and trust their actions without additional security
measures.
Implement a simple username and password system for access control and rely on Github's default
security features.
12. What is ES6 in the context of JavaScript?
The sixth edition of the EMAScript standard introduces new features to JavaScript
13. What is a React component, and how does it differ from a regular HTML element?
• A React component is a reusable piece of Ul that can have its own state and behaviour, unlike regular
HTML
elements.
• A React component is a smaller HTML element nested within a larger HTML element.
O A React component is an HTML element that can only be used in React applications.
14. Sophia is considering using a front-end framework for an upcoming web development project. She
wants a framework that provides server-side rendering (SSR) and seamless integration with a back-end
server. Which front-end framework would you recommend to Sophia?
• React.js
Angular
• Next.js
• Vue.js
15. What does the 'componentDidMount' lifecycle method in a React component typically handle?
Redux offers simpler integration with React components compared to the React Context API.
Redux provides a more efficient solution for managing deeply nested state and handling complex
updates.
Redux is a built-in part of the React framework, ensuring seamless state management.
Redux is known for its superior performance and faster rendering compared to the React Context API.
17. Louis is leading a team of developers tasked with optimising a Node.js application for high
concurrency and low latency. What strategies should Louis recommend for optimising the application's
performance while handling a large number of concurrent requests?
Analyse application bottlenecks and implement microservices using 'Express js' to distribute requests
efficiently.
Include 'Cluster" module to leverage multiple CPU cores for parallel processing and apply 'Nginx' for load
balancing.
• Perform code profiling with 'node-inspect' to identify performance bottlenecks and refactor code
accordingly.
• Implement 'CQRS' and 'Event Sourcing' patterns for command and query separation and scalable data
handling.
18. In Node.js, which keyword is used to import modules from external files?
• import
• require
• include
• use
19. What is the significance of server-side rendering (SSR) in server-side JavaScript, and how does it differ
from client-side rendering (CSR)?
• SSR improves SEO by rendering web pages on the server, while CS renders pages on the client-side.
SSR is used for mobile web applications, while CSR is for desktop applications.
21. How can anonymous callback functions in Node.js contribute to code optimisation?
• They allow for efficient handling of multiple asynchronous tasks and reduce callback hell.
23. Aiden is developing a web application for an e-commerce platform. He needs to provide a seamless
shopping experience with real-time product availability updates. Which technology or approach should
he consider for this complex requirement?
25. How does the 'abort' function in Flask contribute to error handling and the overall robustness of a
web application?
By raising an HTTP error with a specific status code and optional description
26. Jessica is working on a data analysis project. She must retrieve only the top 10 rows from a database
table ordered by a specific column in descending order. Which SQL statement should she use?
• LIMIT 10
27. Alex is working on a high-performance database project and needs to improve query performance by
creating an index on a specific column. Which SQL statement should he use to create an index?
28. David wants to update the 'quantity' of a product in his database to reflect the new stock availability.
Which SQL statement should David use?
30. Olivia is developing a Django application that involves modelling complex relationships between
users, groups and permissions. What advanced Django ORM feature should she use to define and
manage these relationships effectively, considering scalability and maintainability?
31. Your organisation is deploying sensitive workloads in Docker containers and wants to ensure that
container secrets are kept secure. Which Docker feature can you use to manage and protect secrets
within containers?
• Docker Compose
• Docker Hub
32. Lisa is tasked with scaling a Dockerized microservices application. She wants to ensure high
availability and load balancing. Which Docker feature should she use for this purpose?
• Docker Compose
• Docker Swarm
• Docker Hub
• Docker Registry
33. In Docker, what is the primary role of the Docker Daemon (dockerd)?
36. What is the primary purpose of the 'kubectl' command-line tool in Kubernetes?
37. Which microservices pattern is suitable when you need to ensure that a single instance of a service is
running at all times and can be moved to another server if needed?
• Singleton Pattern
Microservices
• Monolith
Hybrid Architecture
O Monolithic applications
40. You are working on a microservices-based application with multiple backend services. How can an
API Gateway enhance the architecture and implement features like Auth2 authentication, rate limiting,
and request/response transformation to improve security and performance.?
By simplifying client interactions and providing a single entry point to the microservices
42. You are designing a RESTful API for a financial application that deals with sensitive customer data.
What security measures should you consider when designing the authentication system for this API?
O Implement Auth 2.0 with JWT (JSON Web Tokens) for secure authentication and authorisation.
O Use a custom authentication mechanism with a shared secret key for all clients.
• Controlling the stacking order of elem ents in a web page, determining which elements appear in front
of others
44. Which software is commonly used to write and edit HTML code?
• Web browsers
47. You must update the 'price' column of all 'products' with a 'category' of 'Electronics' to set the price
to $500. Which SQL statement should you use?
48. What is the primary purpose of Embeddable Watson Al libraries in Al application development?
• Managing databases
49. Which cloud security model allows organisations to centralise security management, policies, and
controls across multiple cloud providers?
• CASB
• laaS
• ссм
• CSPM
50. In a Git workflow, what does the term 'cherry-picking' refer to?
it means selecting and applying specific commits from one branch to another.
It refers to randomly choosing which branch to merge into the main branch.